Energy efficient Key Distribution for Wireless Sensor Networks

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Key distribution in Wireless sensor networks is crucial whenever they deployed in critical applications. Cryptography is used to protect sensitive information from disclosure. Key management is important component in cryptography. Cryptography is not useful if keys are disclosed to attackers. Designing an efficient key management for sensor network is a difficult task because of scarcity of computing and memory resources. An efficient key distribution approach is proposed by using mobile agent paradigm rather than client server model. The proposed approach will use good features of both symmetric and asymmetric cryptography. Mobile Agents are used to generate public and private key pairs, update keys and revocation of keys. The proposed scheme in the first level will use mobile agents for public key dissemination and in second level sensor nodes can involve in constructing symmetric keys for secure communication through mutual authentication and encryption with those keys. The proposed method is implemented using NS2 Simulator and results are compared with existing similar methods in terms of evaluation parameters like throughput and resiliency. The proposed method is improved when it is compared with similar existing methods.

     


  • Keywords


    Key Distribution; Mobile Agents; Wireless Sensor network

  • References


      [1] Ozgur Koray Sahingoz. (2013). Large scale wireless sensor Networks with multi-level dynamic key management scheme. Elsevier, p.20-30.

      [2] Wenjun Gu, Sriram Chellappan, Xiaole Bai, and Honggang Wang.(2011). Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks. IEEE. 6 (4), p.20-30. Author, Title of the Book, Publisher, (200X), pp:XXX-YYY.

      [3] Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, and Vahid Tarokh. (2013). A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks. IEEE. 12 (2), p.12-19.

      [4] Sushmita Ruj, Amiya Nayak and Ivan Stojmenovic. (2013). HKM and Triple Key Distribution in Wireless Sensor Networks with Applications. IEEE. 62 (11), p.45-56.

      [5] Lai B, Kim S, Verbauwhede I. Scalable session key construction protocol for wireless sensor networks. In: Proceedings of the IEEE workshop on Large Scale RealTime and Embedded Systems LARTES, December 2002.

      [6] Perrig A, Szewczyk R, Wen V, Cullar D, Tygar JD. SPINS: security protocols for sensor networks. In: Proceedings of the 7th annual ACM/IEEE international conference on mobile computing and networking, July 2001. p. 189–99.

      [7] Chan H, Perrig A. PIKE: peer intermediaries for key establishment in sensor networks. In: Proceedings of the 24th annual joint conference of the IEEE computer and communications societies (INFOCOM ’05), Miami, FL, USA, March 2005. p. 524–35.

      [8] Chan H, Perrig A. Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE symposium on security and privacy, May 2003. p. 197–213..

      [9] Du W, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of IEEE INFOCOM04. Hong Kong: IEEE Press; 2004. p. 586–97.

      [10] Liu D, Ning P. Establishing HKM keys in distributed sensor networks. In: Proceedings of 10th ACM conference on computer and communications security (CCS03). Washington, DC: ACM Press; 2003. p. 41–7.

      [11] Blom R. Theory and application of cryptographic techniques. In: Proceedings of the Eurocrypt 84 workshop on advances in cryptology. Berlin: Springer; 1985.p.335–8.

      [12] Wallner D, Harder E, Agee R. Key management for multicast: issues and architectures, June 1999, RFC 2627.

      [13] F. Anjum, Location dependent key management using random key predistribution in sensor networks, in: Proceedings of WiSe’06.

      [14] S. Zhu, S. Setia, S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in: Proceedings of The 10th ACM Conference on Computer and Communications Security (CCS ’03), Washington D.C., October, 2003.

      [15] Camtepe SA, Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking (TON) 2007;15(2):346–58.

      [16] Eltoweissy M, Heydari H, Morales L, Sudborough H. Combinatorial optimization of Group key management. Journal of Network and System Management 2004;12(1).

      [17] Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Advance in cryptology-crypto, Lecture notes in computer science, vol. 2139, 2001. p. 213–29.

      [18] Seo, Seung-Hyun, Won, Jongho, Sultana, Salmin, and Bertino, Elisa, Effective Key Management in Dynamic Wireless Sensor Networks. IEEE Transactions on Information Forensics And Security, 10 (2) (February 2015), 371 - 383.

      Pengcheng Zhao, Yong Xu, Min Nan, A Hybrid Key Management Scheme Based on Clustered Wireless Sensor Networks, Scientific Research(Aug 2012), 197-201Author,”Title of the Paper”, Journal name, Vol.X, No.X, (200X), pp.XX-XX, available online: http://xxx, last visit:28.02.2013.

 

View

Download

Article ID: 20234
 
DOI: 10.14419/ijet.v7i4.6.20234




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.